Common use of ACCESS TO SECURITY LOGS AND REPORTS Clause in Contracts

ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide a means for the City to access security logs and reports. Reports shall include latency statistics, user access, user access IP address, API calls for the City’s account including the source IP address of the API caller, the request parameters and the response elements returned, user access history and security logs for all City Data and digital content related to this Agreement. The reports shall be sufficient to enable the City to perform security analysis, resource change tracking and compliance auditing.

Appears in 1 contract

Samples: City of Wichita Information Technology Agreement

AutoNDA by SimpleDocs

ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide a means for reports to the City in a format as agreed to access security logs by both the Contractor and reportsthe City. Reports shall include latency statistics, user access, user access IP address, API calls for the City’s account including the source IP address of the API caller, the request parameters and the response elements returned, user access history and security logs for all City Data and digital content related to this Agreement. The reports shall be sufficient to enable the City to perform security analysis, resource change tracking and compliance auditing.

Appears in 1 contract

Samples: Information Technology Agreement

ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide a means for reports to the City in a format as agreed to access security logs by both the Contractor and reportsthe City. Reports shall include latency statistics, user access, user access IP address, API calls for the City’s account including the source IP address of the API caller, the request parameters and the response elements returned, user access history and security logs for all City Data and digital content related to this AgreementContract. The reports shall be sufficient to enable the City to perform security analysis, resource change tracking and compliance auditing.

Appears in 1 contract

Samples: City of Wichita

ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide a means for reports to the City in a format as agreed to access security logs by both the Contractor and reportsthe City. Reports shall include latency statistics, user access, user access IP address, API calls for the City’s account including the source IP address of the API caller, the request parameters and the response elements returned, user access history and security logs for all City Data and digital content related to this Agreement. The reports shall be sufficient to enable the City to perform security analysis, resource change tracking and compliance auditingauditing and can be requested upon knowledge of a security incident or security breach.

Appears in 1 contract

Samples: Information Technology Agreement

AutoNDA by SimpleDocs

ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide a means for reports to the City in a format as agreed to access security logs by both the Contractor and reportsthe City. Reports shall include latency statistics, user access, user access IP address, API calls for the City’s account including the source IP address of the API caller, the request parameters and the response elements returned, user access history and security logs for all City Data and digital content related to this Agreement. The reports shall be sufficient to enable the City to perform security analysis, resource change tracking and compliance auditing.

Appears in 1 contract

Samples: Information Technology Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.